Ngā Aratohu Guidance

Practical information on keeping systems and data safe from attack.

Guide

Bring Your Own Device (BYOD)

This guidance summarises security considerations for a bring-your-own-device (BYOD) policy in your organisation.

Joint guidance

Secure by demand for operational technology (OT) owners and operators

The intent of this guidance is to help OT owners and operators prioritise secure-by-default products in procurement.

Joint guidance

Volt Typhoon activity

The intent of this guidance is to help leaders tackle urgent cyber risks from state-sponsored groups like Volt Typhoon.

Joint guidance

Implementing SIEM and SOAR platforms

The intent of this guidance is to help organisations implement SIEM and SOAR platforms to enhance cyber security.

Joint guidance

Fast flux: a national security threat

The intent of this guidance is to help organisations understand and mitigate a malicious cyber technique, fast flux.

Joint guidance

Enhanced visibility and hardening for communications infrastructure

The intent of this guidance is to help organisations manage vulnerabilities exploited by a PRC-affiliated threat actor.

Joint guidance

Engaging with artificial intelligence

The intent of this guidance is to support informed, secure and responsible engagement with AI technologies.

Joint guidance

Detecting and mitigating Active Directory compromises

The intent of this guidance is to help organisations detect and mitigate techniques used to compromise Active Directory.

Joint guidance

Deploying artificial intelligence (AI) systems securely

The intent of this guidance is to help organisations that deploy AI systems securely manage cyber risks.

Joint guidance

Cyber security for operational technology

The intent of this guidance is to help organisations manage cyber security risks in operational technology environments.

Joint guidance

Choosing secure and verifiable technologies

The intent of this guidance is to help organisations make informed decisions in procuring digital products and services.

Joint guidance

Best practices for event logging and threat detection

The intent of this guidance is to help organisations strengthen threat detection and resilience through event logging.